{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T21:47:13Z","timestamp":1773092833575,"version":"3.50.1"},"reference-count":31,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,1,1]]},"abstract":"<p>Trust is a binary value either 0 or 1which is not measurable in real application. An entity can either trust another entity completely or do not trust at all. Trust between different entities in generalization-specialization relational model in database varies with respect to adjacent level of hierarchy. Trust value among entities depends not only on hierarchy level but also the context in which entities belong. In this paper the authors propose a model that allows evaluating trust relationships between two entities in the same context. Basically the trust depends on parameters like knowledge, experience and recommendation. In real application it is not always possible to have prior knowledge about mentioned entities. Extending this theory, it is shown that how the trust relationships is evaluated between different entities in different contexts of specialization level. As the trust represents uncertainty therefore, fuzzy logic is used to overcome the concept of binary value for trust. Considering the dynamic attributes of an entity based system, an appropriate agent based methodology could be incorporated. This paper introduced a model called FACO based on Fuzzy logic and Ant colony to calculate both the trust and the updated trust value among entities.<\/p>","DOI":"10.4018\/ijrsda.2015010101","type":"journal-article","created":{"date-parts":[[2015,1,30]],"date-time":"2015-01-30T19:21:47Z","timestamp":1422645707000},"page":"1-21","source":"Crossref","is-referenced-by-count":18,"title":["Evaluating the Degree of Trust Under Context Sensitive Relational Database Hierarchy Using Hybrid Intelligent Approach"],"prefix":"10.4018","volume":"2","author":[{"given":"Manash","family":"Sarkar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India"}]},{"given":"Soumya","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, India"}]},{"given":"Aboul Ella","family":"Hassanien","sequence":"additional","affiliation":[{"name":"Cairo University, Cairo, Egypt, & Computers and Information Faculty, Beni Suef University, Beni Suef, Egypt, & Scientific Research Group in Egypt (SRGE), Giza, Egypt"}]}],"member":"2432","reference":[{"key":"ijrsda.2015010101-0","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502638"},{"key":"ijrsda.2015010101-1","unstructured":"Almutairi, A. H., & Alruwaili, A. H. (2012). Security in database systems. Global Journal of Computer Science and Technology Network, Web & Security, 12(17)."},{"key":"ijrsda.2015010101-2","doi-asserted-by":"publisher","DOI":"10.5120\/7242-0218"},{"key":"ijrsda.2015010101-3","article-title":"Trust Relationship Modeling for Software Assurance.","author":"D.Burke","year":"2010","journal-title":"Proceedings of the 7th International Workshop on Formal Aspects of Security & Trust"},{"key":"ijrsda.2015010101-4","author":"J. P.Chakraborty","year":"2001","journal-title":"Higher Algebra including Modern Algebra"},{"key":"ijrsda.2015010101-5","doi-asserted-by":"crossref","unstructured":"Ciriani, V., Vimercati, D. C., Foresti, S., & Samarati, P. (2007). k-Anonymity, Secure Data Management in Decentralized Systems (pp. 323-353) Springer US.","DOI":"10.1007\/978-0-387-27696-0_10"},{"key":"ijrsda.2015010101-6","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948124"},{"key":"ijrsda.2015010101-7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1290.001.0001","author":"M.Dorigo","year":"2004","journal-title":"Ant Colony Optimization. A Bradford book"},{"key":"ijrsda.2015010101-8","unstructured":"Fimreite, A. L. & Pel\u00e6greid. (2005). Specialization and Coordination: Implications for Integration and Autonomy in a Multi-Level System. Stein rokkan centre for social studies, unifob as, november 2005 Working Paper 7."},{"issue":"3","key":"ijrsda.2015010101-9","first-page":"1596","article-title":"Generalization Based Approach to Confidential Database Updates.","volume":"2","author":"N.Gosai","year":"2012","journal-title":"International Journal of Engineering Research and Applications"},{"key":"ijrsda.2015010101-10","doi-asserted-by":"publisher","DOI":"10.1109\/69.334885"},{"issue":"11","key":"ijrsda.2015010101-11","first-page":"1099","article-title":"Randomized Generalization for Aggregate Suppression Over Hidden Web Databases.","volume":"4","author":"X.Jin","year":"2011","journal-title":"PVLDB"},{"key":"ijrsda.2015010101-12","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755710"},{"key":"ijrsda.2015010101-13","doi-asserted-by":"publisher","DOI":"10.5120\/1725-2327"},{"key":"ijrsda.2015010101-14","first-page":"61","article-title":"Database Security: What Students Need to Know.","volume":"9","author":"M. C.Murray","year":"2010","journal-title":"Journal of Information Technology Education: Innovations in Practice"},{"key":"ijrsda.2015010101-15","doi-asserted-by":"publisher","DOI":"10.5120\/14469-2758"},{"key":"ijrsda.2015010101-16","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2002.802452"},{"key":"ijrsda.2015010101-17","doi-asserted-by":"publisher","DOI":"10.1145\/2487259.2487264"},{"key":"ijrsda.2015010101-18","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-007-0049-9"},{"key":"ijrsda.2015010101-19","first-page":"763","article-title":"A Statistical Relational Model for Trust Learning.","volume":"Vol. 2","author":"A.Rettinger","year":"2008","journal-title":"Proceedings of the 7th International joint conference on Autonomous agents and multiagent systems"},{"key":"ijrsda.2015010101-20","unstructured":"Ross, T. J. (2005). Fuzzy logic with Engineering Applications (2nd ed.). New Delhi: Wiley India(P.) Ltd."},{"key":"ijrsda.2015010101-21","doi-asserted-by":"crossref","unstructured":"Samek, J., & Zboril, F. (2010). Hierarchical Model of Trust in Contexts. In Networked Digital Technologies, Vol 88 of Communications in Computer and Information Science (CCIS)(pp. 356\u2013365), Springer Verlag.","DOI":"10.1007\/978-3-642-14306-9_36"},{"key":"ijrsda.2015010101-22","author":"A.Silberschatz","year":"2006","journal-title":"Database System Concepts"},{"key":"ijrsda.2015010101-23","author":"J.Speelpenning","year":"2001","journal-title":"Data Modeling and Relational Database Design: Student Guide"},{"issue":"1","key":"ijrsda.2015010101-24","first-page":"229","article-title":"A Survey on Cloud Database Management International Journal Of Engineering","volume":"2","author":"M. V.Srimathi","year":"2013","journal-title":"Computer Science"},{"key":"ijrsda.2015010101-25","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-012-0850-4"},{"key":"ijrsda.2015010101-26","doi-asserted-by":"publisher","DOI":"10.1145\/2320765.2320824"},{"key":"ijrsda.2015010101-27","first-page":"455","article-title":"Trusted Business System Model Using Context Sensitiveness.","author":"C.Subramaniam","year":"2010","journal-title":"Sixth International Conference on Networked Computing and Advanced Information Management (NCM"},{"key":"ijrsda.2015010101-28","author":"Y.Tang","year":"2013","journal-title":"Deep Learning using Linear Support Vector Machines"},{"key":"ijrsda.2015010101-29","author":"T.Teorey","year":"2011","journal-title":"Database Modeling and Design: Logical Design"},{"key":"ijrsda.2015010101-30","first-page":"149","article-title":"Trust Management Services in Relational Databases.","author":"S. D. C.Vimercati","year":"2007","journal-title":"Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007"}],"container-title":["International Journal of Rough Sets and Data Analysis"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=122776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:02:47Z","timestamp":1654095767000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijrsda.2015010101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2015,1,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijrsda.2015010101","relation":{},"ISSN":["2334-4598","2334-4601"],"issn-type":[{"value":"2334-4598","type":"print"},{"value":"2334-4601","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,1,1]]}}}